Category: CyberSecurityNews

Threat Actors May Leverage CI/CD Environments to Gain Access To Restricted Resources
08
Apr
2025

Threat Actors May Leverage CI/CD Environments to Gain Access To Restricted Resources

Cybersecurity experts have observed a concerning trend where sophisticated threat actors are increasingly targeting Continuous Integration/Continuous Deployment (CI/CD) pipelines to…

Google to Patch 23-years Old Chrome Vulnerability That Leaks Browsing History
08
Apr
2025

Google to Patch 23-years Old Chrome Vulnerability That Leaks Browsing History

Google has announced a significant security improvement for Chrome version 136. This update addresses a 23-year-old vulnerability that could allow…

Linux 6.15-rc1 Released With Major Driver Update & Perfomance Boost
08
Apr
2025

Linux 6.15-rc1 Released With Major Driver Update & Perfomance Boost

The Linux community has unveiled the highly anticipated Linux 6.15-rc1 test kernel, marking a significant milestone in the ongoing evolution…

CISA Releases NICE Workforce Framework Version 2.0.0 Released
07
Apr
2025

CISA Releases NICE Workforce Framework Version 2.0.0 Released

The US Cybersecurity and Infrastructure Security Agency (CISA) has officially released Version 2.0.0 of the NICE Workforce Framework for Cybersecurity,…

Critical pgAdmin Vulnerability Let Attackers Execute Remote Code
07
Apr
2025

Critical pgAdmin Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability discovered in pgAdmin 4, the most widely used management tool for PostgreSQL databases, is allowing attackers…

Bitdefender GravityZone Console Flaw Let Attackers Execute Arbitrary Commands
07
Apr
2025

Bitdefender GravityZone Console Flaw Let Attackers Execute Arbitrary Commands

A critical security vulnerability has been discovered in Bitdefender GravityZone Console that could allow remote attackers to execute arbitrary commands…

Key Updates on Attacks, Vulnerabilities, & Data Breaches
07
Apr
2025

Key Updates on Attacks, Vulnerabilities, & Data Breaches

Welcome to this week’s Cybersecurity Newsletter, providing you with the latest updates and essential insights from the rapidly evolving field…

10 Best Ransomware File Decryptor Tools in 2025
06
Apr
2025

10 Best Ransomware File Decryptor Tools in 2025

Ransomware file decryptor tools are essential for recovering data encrypted by malicious software without paying ransoms. These tools help victims…

Microsoft Strengthens Outlook's Email Ecosystem to Protect Inboxes
06
Apr
2025

Microsoft Strengthens Outlook’s Email Ecosystem to Protect Inboxes

Microsoft Outlook will enforce stricter authentication requirements for high-volume senders, impacting domains that send over 5,000 emails daily. These changes,…

"Clipboard Hijacking" A Fake CAPTCHA Steal Clipboard Data Via Hacked Sites
05
Apr
2025

“Clipboard Hijacking” A Fake CAPTCHA Steal Clipboard Data Via Hacked Sites

A sophisticated new cyberattack chain dubbed “KongTuke” has been uncovered by cybersecurity researchers, targeting unsuspecting internet users through compromised legitimate…

Beware of Weaponized Recruitment Emails that Deliver BeaverTail and Tropidoor Malware
05
Apr
2025

Beware of Weaponized Recruitment Emails that Deliver BeaverTail and Tropidoor Malware

Cybersecurity researchers have uncovered a sophisticated attack campaign where threat actors impersonate recruitment professionals to distribute dangerous malware payloads. On…

Ivanti Connect Secure Vulnerability (CVE-2025-22457) Actively Exploited in the Wild
05
Apr
2025

Ivanti Connect Secure Vulnerability (CVE-2025-22457) Actively Exploited in the Wild

Ivanti has disclosed a critical vulnerability, CVE-2025-22457, affecting its Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways…